基于PE文件的加殼檢測(cè)與木馬識(shí)別技術(shù)
[Abstract]:Network security is an integral part of informatics, and the analysis and detection technology of Trojan horse is the most important in the field of network security. Today, most computers and even mobile phones are equipped with a variety of Trojan detection and kill software. This paper mainly focuses on the analysis and detection methods of Trojan horse under Windows system. In Windows system, the Trojan horse must exist in the form of PE file in order to further invade the computer to achieve the illegal purpose. It can not be ignored to judge whether the PE file is shell or not in the detection process of Trojan horse, so a series of research on the method of shell detection of PE file is also made in this paper. In this paper, the current situation of Trojan horse detection at home and abroad is introduced and analyzed in detail, and the basic method of Trojan horse detection is put forward, that is, dynamic detection and static detection. Secondly, the organization structure, analysis method and block characteristics of PE file are introduced in detail. For the further extraction of all kinds of valid information and classification features from PE files. Then a method to identify the PE file is introduced, which is mainly based on the Minkowski distance of the specific attributes of the PE file. Because there are significant differences between PE files and non-hulled PE files on certain attribute characteristics. Experimental results show that this method can effectively detect PE files. In the end, a method of static Trojan detection based on C5.0 decision tree algorithm is proposed. The algorithm takes various attributes extracted from PE file as classification features and combines efficient boosting algorithm. The PE file is firstly de-hulled with PEid software, and then further processed to improve the performance index. The experimental results show that this method has made some progress in many aspects.
【學(xué)位授予單位】:廣西大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP393.08
【參考文獻(xiàn)】
相關(guān)期刊論文 前10條
1 丁姍;;淺談木馬文件特征碼的定位[J];河南紡織高等專科學(xué)校學(xué)報(bào);2007年02期
2 方濱興;崔翔;王威;;僵尸網(wǎng)絡(luò)綜述[J];計(jì)算機(jī)研究與發(fā)展;2011年08期
3 楊平;羅紅;喬向東;;Windows Rootkit隱藏技術(shù)研究[J];計(jì)算機(jī)與信息技術(shù);2009年03期
4 顏會(huì)娟;秦杰;;基于非線性SVM模型的木馬檢測(cè)方法[J];計(jì)算機(jī)工程;2011年08期
5 嵇海明,楊宗源;PE文件格式剖析[J];計(jì)算機(jī)應(yīng)用研究;2004年03期
6 楊彥;黃皓;;基于攻擊樹(shù)的木馬檢測(cè)方法[J];計(jì)算機(jī)工程與設(shè)計(jì);2008年11期
7 張新宇,卿斯?jié)h,馬恒太,張楠,孫淑華,蔣建春;特洛伊木馬隱藏技術(shù)研究[J];通信學(xué)報(bào);2004年07期
8 李軍麗;;特洛伊木馬病毒的隱藏技術(shù)[J];網(wǎng)絡(luò)安全技術(shù)與應(yīng)用;2008年01期
9 雷校勇;黃小平;;Windows RootKit技術(shù)原理及防御策略[J];微型電腦應(yīng)用;2006年07期
10 彭國(guó)軍;王泰格;邵玉如;劉夢(mèng)冷;;基于網(wǎng)絡(luò)流量特征的未知木馬檢測(cè)技術(shù)及其實(shí)現(xiàn)[J];信息網(wǎng)絡(luò)安全;2012年10期
,本文編號(hào):2142802
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2142802.html